Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Synchronization
biblio
Recovery-based resilient latency-insensitive systems
Submitted by BrandonB on Wed, 05/06/2015 - 1:53pm
logic circuits
Throughput
System performance
synchronous circuits
Synchronization
stalling signal
RLIS
Relays
recovery-based resilient latency-insensitive systems
queue sizing problem
clock cycle time
interconnect delay
Integrated circuit interconnections
improved queues
global stalling mechanism
expensive timing cost
error-recovery
error impact
Degradation
Clocks
biblio
Robustness of attack-resilient state estimators
Submitted by BrandonB on Wed, 05/06/2015 - 12:57pm
Noise measurement
Vectors
unmanned ground vehicle
Synchronization
state-based feedback controller
state feedback
state estimation
robust control
remotely operated vehicles
actuators
Noise
modeling errors
cyber-physical systems
CPS
Computational modeling
attack-resilient state estimator robustness
attack-resilient state estimation
biblio
Decoupling Identity Resolution from the Maintenance of Identity Information
Submitted by BrandonB on Wed, 05/06/2015 - 12:21pm
Entity Resolution
Synchronization
Robustness
robust information access
quality management
Organizations
maintenance engineering
knowledge based systems
Context
decoupling identity resolution
EIIM model
entity identity structures
batch IR configuration
ER
Erbium
identity information
identity knowledge base
Identity Life Cycle Management
identity management service
IKB
information quality
information retrieval
Interactive Identity Resolution
biblio
Examining the Effect of Wireless Sensor Network Synchronization on Base Station Anonymity
Submitted by BrandonB on Mon, 05/04/2015 - 1:11pm
synchronisation
WSN topology
wireless sensor networks
wireless sensor network synchronization
Wireless Sensor Network
Wireless communication
traffic analysis techniques
TPSN
timing-synch protocol for sensor networks
telecommunication traffic
telecommunication security
telecommunication network topology
Synchronization
anonymity
sensors
security mechanisms
reference broadcast synchronization
Receivers
RBS
Protocols
network traffic flow
location privacy
evidence theory analysis
data sources
BS anonymity improvement
base station anonymity
biblio
Exploring the use of ENF for multimedia synchronization
Submitted by BrandonB on Mon, 05/04/2015 - 10:50am
Multimedia communication
video recording
video
time-varying random process
Synchronization
synchronisation
Streaming media
random processes
Power Grid
multiview video recording automatic synchronization
multimedia signal timing fingerprint
multimedia recordings
audio
historical recordings
historical audio recording automatic synchronization
frequency estimation
Forensics
forensic applications
ENF signal
ENF
electromagnetic interference
electric network frequency signal
audio recording
biblio
Underwater ultra-wideband fingerprinting-based sparse localization
Submitted by BrandonB on Mon, 05/04/2015 - 10:48am
sparse recovery
Vectors
UWB signal utilization
underwater ultrawideband fingerprinting-based sparse localization
underwater acoustic propagation
underwater acoustic communication
underwater
ultrawideband signal utilization
ultra wideband communication
Synchronization
sparsity-based localization method
Accuracy
Signal processing algorithms
receiving antennas
Indexes
grid matching
fingerprinting localization
Dictionaries
compressive sampling
compressed sensing
acoustic wave utilization
biblio
Survivable SCADA Via Intrusion-Tolerant Replication
Submitted by BrandonB on Thu, 04/30/2015 - 2:07pm
Protocols
Synchronization
survivable SCADA system
Survivability
Servers
security of data
SCADA systems
SCADA architecture
resilience
Reliability
Clocks
production engineering computing
performance degradation
Monitoring
Libraries
intrusion-tolerant replication
intrusion-tolerant protocols
fault tolerance
Cyber Attacks
cyber attack
biblio
Towards trustworthy complex event processing
Submitted by BrandonB on Thu, 04/30/2015 - 2:05pm
Fault tolerant systems
trustworthy
Trusted Computing
trust
threat analysis
Synchronization
soft realtime computing
Servers
Runtime
mission-critical applications
minimum runtime overhead
Intrusion Detection
intelligent computing
actionable situational knowledge
fault tolerance
event processing operations
Dependable Computing
Context
complex event processing
Byzantine Fault Tolerance
business intelligence
Business
Big Data
application semantics
algorithmic stock trading
biblio
Swiper: Exploiting Virtual Machine Vulnerability in Third-Party Clouds with Competition for I/O Resources
Submitted by BrandonB on Thu, 04/30/2015 - 1:13pm
Cloud Computing
delays
IP networks
security
Synchronization
Throughput
Virtualization
biblio
Cloud Password Manager Using Privacy-Preserved Biometrics
Submitted by BrandonB on Thu, 04/30/2015 - 12:48pm
password leakage risk
web services
Web service account
untrusted cloud service providers
Trusted Computing
token authentication
Synchronization
security
privacy-preserved biometrics
privacy preservation
privacy enhanced biometrics
privacy
password storage
password manager
authorisation
nonbiometric password manager
master password based security
local password manager client synchronization
distributed service providers
data privacy
Cryptography
cloud password manager
Cloud Computing
cloud
biometrics based authentication
biometrics (access control)
biometrics
authentication
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »